comm 226 software chitu okoli associate professor in business technology management john molson...

21
COMM 226 Software Chitu Okoli Associate Professor in Business Technology Management John Molson School of Business, Concordia University, Montréal 1

Upload: robert-weaver

Post on 18-Dec-2015

219 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: COMM 226 Software Chitu Okoli Associate Professor in Business Technology Management John Molson School of Business, Concordia University, Montréal 1

COMM 226

Software

Chitu OkoliAssociate Professor in Business Technology ManagementJohn Molson School of Business, Concordia University, Montréal

1

Page 2: COMM 226 Software Chitu Okoli Associate Professor in Business Technology Management John Molson School of Business, Concordia University, Montréal 1

Software sourcing

How organizations get their software

2

Page 3: COMM 226 Software Chitu Okoli Associate Professor in Business Technology Management John Molson School of Business, Concordia University, Montréal 1

3

Three major options for acquiring application software

1. Buy off-the-shelf2. Buy off-the-shelf with alterations3. Tailor-made - custom-developed

software

Page 4: COMM 226 Software Chitu Okoli Associate Professor in Business Technology Management John Molson School of Business, Concordia University, Montréal 1

Owning versus licensing software

• Unless you build it yourself, you don’t actually “buy” software—you buy a license to use program– When you buy a book, you don’t actually buy

the rights to modify and redistribute the book; you only buy a license to read your own paper or electronic copy of it

• Ownership remains with development company– Licensee (“buyer”) usually needs to pay

again for new versions

Page 5: COMM 226 Software Chitu Okoli Associate Professor in Business Technology Management John Molson School of Business, Concordia University, Montréal 1

5

Open-source software

• Open-source software is owned by all the software contributors in the community

• A special case of “buy off-the-shelf with alterations”

• Contributing companies save money by shared labour with other contributors

• Some vendors make money by offering support

• Users save money because they can use the software for free without paying license fees

• The most important open source software is usually of high quality

Page 6: COMM 226 Software Chitu Okoli Associate Professor in Business Technology Management John Molson School of Business, Concordia University, Montréal 1

Cloud computing

• Clients do not own the computers; they just use the cloud providers’ computers

• Hardware, software, and applications are provided as a service, through a web browser

• The cloud is a metaphor for the Internet, which makes software and data services available from any location at any time

• Common examples of cloud computing for personal use:– Software as a Service (SaaS): Web e-mail (Hotmail),

online applications (Google Docs)– Infrastructure as a Service (IaaS): online backup

(Dropbox, iCloud), blogs (WordPress.com)

Page 7: COMM 226 Software Chitu Okoli Associate Professor in Business Technology Management John Molson School of Business, Concordia University, Montréal 1

Business benefits of cloud computing

https://www.youtube.com/watch?v=whkyRvugqlM

Page 8: COMM 226 Software Chitu Okoli Associate Professor in Business Technology Management John Molson School of Business, Concordia University, Montréal 1

Software security

8

Page 9: COMM 226 Software Chitu Okoli Associate Professor in Business Technology Management John Molson School of Business, Concordia University, Montréal 1

Computer viruses and malicious code

• Virus: A program that attaches itself to other programs, replicates itself, and spreads– Usually combined with some other malware (called its payload) to cause damage, such as damaging or stealing data

– Worm: Replicates itself and spreads over a network, without attaching itself to other programs

• Botnet: a network of hijacked computers (zombies) that can do whatever the hacker wants them to do– Hacker uses a virus or worm to install a payload that

secretly takes control of victims’ computers– Like a good biological virus, the botnet virus doesn’t

usually let the user know that it’s even there, maybe even for years

9

Page 10: COMM 226 Software Chitu Okoli Associate Professor in Business Technology Management John Molson School of Business, Concordia University, Montréal 1

Virus prevention • Install antivirus software• Make backups (and scan them for

viruses!)• Avoid untrusted sources of software• Never open unexpected e-mail

attachments, even if you know the sender

• If your computer gets a virus…– Run anti-virus program with fresh updates– If still necessary, reformat your computer:

• Reformat• Run antivirus• Reinstall programs• Reinstate your backups—you have backups, right?10

Page 11: COMM 226 Software Chitu Okoli Associate Professor in Business Technology Management John Molson School of Business, Concordia University, Montréal 1

11

Page 12: COMM 226 Software Chitu Okoli Associate Professor in Business Technology Management John Molson School of Business, Concordia University, Montréal 1

Operating systems

12

Page 13: COMM 226 Software Chitu Okoli Associate Professor in Business Technology Management John Molson School of Business, Concordia University, Montréal 1

13

What is Linux?

https://www.youtube.com/watch?v=5ocq6_3-nEw

Page 14: COMM 226 Software Chitu Okoli Associate Professor in Business Technology Management John Molson School of Business, Concordia University, Montréal 1

14

Page 15: COMM 226 Software Chitu Okoli Associate Professor in Business Technology Management John Molson School of Business, Concordia University, Montréal 1

15

Page 16: COMM 226 Software Chitu Okoli Associate Professor in Business Technology Management John Molson School of Business, Concordia University, Montréal 1

16

Page 17: COMM 226 Software Chitu Okoli Associate Professor in Business Technology Management John Molson School of Business, Concordia University, Montréal 1

17

Page 18: COMM 226 Software Chitu Okoli Associate Professor in Business Technology Management John Molson School of Business, Concordia University, Montréal 1

18

Page 19: COMM 226 Software Chitu Okoli Associate Professor in Business Technology Management John Molson School of Business, Concordia University, Montréal 1

Popular operating systems• Major desktop operating systems

– Windows (90%)– Apple (4-7%)– Linux (1-2%)

• Major web server operating systems– Linux/Unix (67%)– Windows (33%)

• Major mobile operating systems (smartphones)– Android (75-85%)– iOS (11-19%)

19

Sourceshttps://en.wikipedia.org/wiki/Usage_share_of_operating_systems http://w3techs.com/technologies/overview/operating_system/all

Page 20: COMM 226 Software Chitu Okoli Associate Professor in Business Technology Management John Molson School of Business, Concordia University, Montréal 1

20

Why is Windows more popular for business than Mac?

• A somewhat biased (pro-Mac) but detailed perspective:– How Windows REALLY Became The Ma

rket Leader (Pt.1)

– How Windows REALLY Became The Market Leader (Pt.2)

Page 21: COMM 226 Software Chitu Okoli Associate Professor in Business Technology Management John Molson School of Business, Concordia University, Montréal 1

Sources

• Most of the slides are adapted from COMM 226 Business Technology Management by David M. Kroenke, Andrew Gemino, Peter Tingling, and Earl H. McKinney, Jr. 2nd Custom Edition for Concordia University (2014) published by Pearson Canada. ISBN 13: 978-1-269-96956-7

• Other sources are noted on the slides themselves

21